UEFI Secure Boot out of scope? Trusted Computing out of scope? How high to climb in this thesis?Chain of trust: We have to trust something. then pass the trust forward. -> boot image which GPG signed which is verified and then written into USB media (See #3) -> trusted USB media...